skip to main content
article

Tussle in cyberspace: defining tomorrow's internet

Published: 01 June 2005 Publication History
  • Get Citation Alerts
  • Abstract

    The architecture of the Internet is based on a number of principles, including the self-describing datagram packet, the end-to-end arguments, diversity in technology and global addressing. As the Internet has moved from a research curiosity to a recognized component of mainstream society, new requirements have emerged that suggest new design principles, and perhaps suggest that we revisit some old ones. This paper explores one important reality that surrounds the Internet today: different stakeholders that are part of the Internet milieu have interests that may be adverse to each other, and these parties each vie to favor their particular interests. We call this process "the tussle." Our position is that accommodating this tussle is crucial to the evolution of the network's technical architecture. We discuss some examples of tussle, and offer some technical design principles that take it into account.

    References

    [1]
    {1} M. S. Blumenthal and D. D. Clark, "Rethinking the design of the Internet: The end-to-end arguments versus the brave new world," ACM Trans. Internet Technol., vol. 1, no. 1, Aug. 2001.]]
    [2]
    {2} D. Vinck, Ed., Everyday Engineering: An Ethnography of Design and Innovation. Cambridge, MA: MIT Press, 2003.]]
    [3]
    {3} T. Hughes, Rescuing Prometheus. New York: Pantheon Books, 1998.]]
    [4]
    {4} B. Latour, "Technology is society made durable," in A Sociology of Monsters: Essays on Power, Technology and Domination. ser. Sociological Review Monograph, J. Law, Ed. London, U.K.: Routledge, 1991.]]
    [5]
    {5} S. Strum and B. Latour, The Social Shaping of Technology, 2nd ed. Berkshire, U.K.: Open University Press, 1999, ch. Redefining the Social Link: From Baboons to Humans.]]
    [6]
    {6} M. Callon, The Social Construction of Technological Systems . Cambridge, MA: MIT Press, 1987, ch. Society in the Making, pp. 17-50.]]
    [7]
    {7} O. Hanseth and K. Braa, "Technology as traitor: Emergent SAP infrastructure in a global organization," in Proc. Int. Conf. Information Systems, 1998, pp. 188-196.]]
    [8]
    {8} M. Callon, "Techno-economic networks and irreversibility," in A Sociology of Monsters: Essays on Power, Technology and Domination. ser. Sociological Review Monograph, J. Law, Ed. London, U.K.: Routledge, 1991.]]
    [9]
    {9} C. M. Christensen, The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail. Watertown, MA: Harvard Business School Press, 1997.]]
    [10]
    {10} L. Lessig, Code and Other Laws of Cyberspace. New York: Basic Books, 1999.]]
    [11]
    {11} M. Katz and C. Shapiro, "Systems competition and network effects," J. Economic Perspectives, vol. 8, no. 2, pp. 93-115, 1994.]]
    [12]
    {12} J. von Neumann and O. Morgernstern, The Theory of Games and Economic Behavior. Princeton, NJ: Princeton Univ. Press, 1944.]]
    [13]
    {13} J. F. Nash, "Equilibrium points in n-person games," Proc. National Academy of Sciences, vol. 36, pp. 48-49, 1950.]]
    [14]
    {14} S. Wolgar, "Configuring the user, the case of usability trials," in A Sociology of Monsters: Essays on Power, Technology and Domination. ser. Sociological Review Monograph, J. Law, Ed. London, U.K.: Routledge, 1991.]]
    [15]
    {15} R. J. Perlman, "Network Layer Protocols With Byzantine Robustness," Lab. Computer Science, Massachusetts Inst. Technology, Cambridge, MA, Tech. Rep. MIT-LCS-TR-429, 1988.]]
    [16]
    {16} S. Savage, "Protocol Design in an Uncooperative Internet," Ph.D. dissertation, Dept. Computer Science, Univ. Washington, Seattle, WA, 2002.]]
    [17]
    {17} S. Savage, "Sting: A TCP-based network measurement tool," in Proc. 1999 USENIX Symp. Internet Technologies and Systems, Boulder, CO, 1999, pp. 71-79.]]
    [18]
    {18} S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, "TCP congestion control with a misbehaving receiver," ACM Comput. Commun. Rev., vol. 29, no. 5, pp. 71-78, Oct. 1999.]]
    [19]
    {19} S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical network support for IP traceback," in Proc. ACM SIGCOMM, Stockholm, Sweden, Aug. 2000, pp. 295-306.]]
    [20]
    {20} S. Savage, "Network support for IP traceback," IEEE/ACM Trans. Networking, vol. 9, no. 3, pp. 226-237, Jun. 2001.]]
    [21]
    {21} (2003) P3P 1.0: A New Standard in Online Privacy. World Wide Web Consortium. {Online}. Available: http://www.w3.org/ P3P/brochure.html]]
    [22]
    {22} M. Blaze, J. Feigenbaum, and J. Ioannidis, "The keynote trust-management system version 2," Internet RFC 2704, Sep. 1999.]]
    [23]
    {23} M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized trust management," in Proc. 17th IEEE Symp. Security and Privacy, 1996, pp. 164-173.]]
    [24]
    {24} D. Durham, J. Boyle, R. Cohen, S. Herzog, R. Rajan, and A. Sastry, "The COPS (Common Open Policy Service) protocol," Internet RFC 2748, Jan. 2000.]]
    [25]
    {25} W. Vickrey, "Counterspeculation, auctions, and competitive sealed tenders," J. Finance, vol. 16, pp. 8-37, 1961.]]
    [26]
    {26} N. Nissan and A. Ronen, "Algorithmic mechanism design," in Proc. ACM Symp. Theory of Computing, Atlanta, GA, May 1999, pp. 129-140.]]
    [27]
    {27} J. Feigenbaum and S. Shenker, "Distributed algorithmic mechanism design: Recent results and future directions," in Proc. 6th Int. Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, New York, 2002, pp. 1-13.]]
    [28]
    {28} K. Binmore, Essays on the Foundations of Game Theory. Oxford, U.K.: Basil Blackwell, 1990.]]
    [29]
    {29} S. Besen and J. Farrel, "Choosing how to compete: Strategies and tactics in standardization," J. Economic Perspectives, vol. 8, no. 2, pp. 117-131, 1994.]]
    [30]
    {30} W. Lehr, "Compatibility standards and industry competition: Two case studies," Economics of Innovation and New Technology, vol. 4, no. 2, pp. 97-112, 1996.]]
    [31]
    {31} Internet Economics, L. McKnight and J. Bailey, Eds., MIT Press, 1997.]]
    [32]
    {32} Broadband: Bringing Home the Bits, Computer Science and Telecommunications Board, National Research Council, 2002.]]
    [33]
    {33} J. Rekhter, "EGP and policy based routing in the new NSFNET backbone," RFC 1092, Feb. 1989.]]
    [34]
    {34} D. D. Clark, "Policy routing for Internet protocols," Internet RFC 1102, 1989.]]
    [35]
    {35} K. Lougheed and J. Y. Rekhter, "Border gateway protocol (BGP)," Internet RFC 1105, Jun. 1989.]]
    [36]
    {36} X. Yang, "NIRA: A new Internet routing architecture," in Proc. ACM SIGCOMM FDNA 2003 Workshop, Karlsruhe, Germany, Aug. 2003.]]
    [37]
    {37} D. Andersen, H. Balakrishnan, F. Kaashoek, and R. Morris, "Resilient overlay networks," in Proc. 18th ACM Symp. Operating Systems Principles, Banff, Alberta, Canada, Oct. 2001.]]
    [38]
    {38} H. Nissenbaum. (2001) Securing trust online: Wisdom or oxymoron. Boston Univ. Law Rev. {Online}. Available: http://www.princeton.edu/helen/BU-final-trust.pdf]]
    [39]
    {39} S. L. Garfinkel. (2004) The Pure Software Act of 2006. {On-line}. Available: http://www.technologyreview.com/articles/wo_ garfinke1040 704.asp]]
    [40]
    {40} N. Economides, "The economics of networks," Int. J. Industrial Organization, vol. 14, no. 6, pp. 670-699, 1996.]]
    [41]
    {41} Perspectives on the National Information Infrastructure: Ensuring Interoperability, Computer Systems Policy Project, 1994.]]
    [42]
    {42} An Architectural Framework for the National Information Infrastructure, Cross-Industry Working Team, 1994.]]
    [43]
    {43} Realizing the Information Future: The Internet and Beyond: Computer Science and Telecommunications Board, National Research Council, 1994.]]
    [44]
    {44} J. Saltzer, D. Reed, and D. D. Clark, "End-to-end arguments in system design," ACM Trans. Comput. Syst., vol. 2, no. 4, Nov. 1984.]]
    [45]
    {45} R. Levin, E. S. Cohen, W. M. Corwin, F. J. Pollack, and W. A. Wulff, "Policy/mechanism separation in HYDRA," in Symp. Operating Systems Principles, 1975, pp. 132-140.]]
    [46]
    {46} I. Goldberg, D. Wagner, and E. Brewer, "Privacy-enhancing technologies for the Internet," in Proc. IEEE COMPCON, 1997, pp. 103-109.]]

    Cited By

    View all

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image IEEE/ACM Transactions on Networking
    IEEE/ACM Transactions on Networking  Volume 13, Issue 3
    June 2005
    255 pages

    Publisher

    IEEE Press

    Publication History

    Published: 01 June 2005
    Published in TON Volume 13, Issue 3

    Author Tags

    1. competition
    2. design principles
    3. economics
    4. network architecture
    5. trust
    6. tussle

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)11
    • Downloads (Last 6 weeks)5

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)The compositional architecture of the internetCommunications of the ACM10.1145/322658862:3(78-87)Online publication date: 21-Feb-2019
    • (2019)Feasibility of IP-over-ICNTelecommunications Systems10.1007/s11235-019-00593-573:1(27-46)Online publication date: 31-Jul-2019
    • (2018)Picking a PartnerProceedings of the Applied Networking Research Workshop10.1145/3232755.3232785(33-39)Online publication date: 16-Jul-2018
    • (2018)On Analyzing Self-Driving NetworksProceedings of the Afternoon Workshop on Self-Driving Networks10.1145/3229584.3229588(1-7)Online publication date: 7-Aug-2018
    • (2016)Virtual Machine Priority Adaption to Enforce Fairness Among Cloud UsersProceedings of the 12th Conference on International Conference on Network and Service Management10.5555/3375069.3375080(91-99)Online publication date: 31-Oct-2016
    • (2016)Values and NetworksACM SIGCOMM Computer Communication Review10.1145/2935634.293564046:2(25-31)Online publication date: 9-May-2016
    • (2016)Negotiating Premium Peering PricesACM Transactions on Internet Technology10.1145/288361016:2(1-22)Online publication date: 14-Apr-2016
    • (2016)Subsidization CompetitionIEEE/ACM Transactions on Networking10.1109/TNET.2015.246660324:4(2563-2576)Online publication date: 1-Aug-2016
    • (2015)Bootstrapping Evolvability for Inter-Domain RoutingProceedings of the 14th ACM Workshop on Hot Topics in Networks10.1145/2834050.2834101(1-7)Online publication date: 16-Nov-2015
    • (2015)Towards Adaptive Network Nodes via Service Chain ConstructionIEEE Transactions on Network and Service Management10.1109/TNSM.2015.243211612:2(248-262)Online publication date: 1-Jun-2015
    • Show More Cited By

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media